Backup Exec 16 provides reliable, powerful, and simple recovery across any infrastructure including virtual, physical, and cloud environments. It offers centralized management, global data deduplication, automated data lifecycle management, and granular recovery of Microsoft applications from a single backup. Backup Exec also supports the latest virtualization platforms including VMware vSphere 6.0.2 and Microsoft Hyper-V 2016.
14. EDUCATION SERVICES
Reduce the time and resources spent backing up and
recovering data. Restore individual items from database
and virtual backups
Granular Restore Technology
43. 52
Minimize Downtime With Virtual Conversions
Virtualize with Confidence
Migration Accelerator – P2V, B2V & V2P
Process diagram
Hyper-V or VMware HostBackup Exec 16 ServerPhysical Server
Minimize Downtime
Reduce Management
Time and Set-up
Virtualize
Accelerate Move to
Virtualized Environment
High Speed
Dramatically Reduce
System Downtime
VM VM VMVM
VM VM VMVM
Parallel Option
Serial Option
Backup
Backup
Convert
Convert
Veritas Backup Exec™ 16 is the trusted recovery solution for millions of businesses worldwide. With increasingly complex infrastructures and evolving IT needs, it’s vital that your business has a dynamic, unified solution that will deliver high performance, reliability and simplicity – from planning through to execution. Your business needs backup and recovery that adapts to your environment; that works with your budget, not against it. Your business needs Backup Exec™ 16.
Key take-aways from Spiceworks Data
Nearly half data is still in physical systems …. Cloud is growing rapidly
In 3 years still 1/3 of data in physical
B&R is #1 cloud use case, but not all data can be sent to the cloud
Average of 4.1 DP solutions / customer … more data in future
Clear preference expressed in survey for Unified DP solution
Mid-Market organizations need a DP solution that is powerful, flexible, trusted
Powerful:
Rapid backup and restore of virtual machines: Instant GRT and Instant Recovery
Use “Any S3” cloud connector to back up to any S3-compatible data store
Flexible:
One backup system for all virtual, physical and cloud data
Backup Exec supports the widest range of storage devices of any other backup solution
Trusted
Veritas is committed to Backup Exec:
we have dedicated sales and marketing teams, we have improved partner profitability programs
Part of the trust is knowing ongoing version commitment (next slide)
Here is the Backup Exec customer value proposition: One Backup to Rule them All
You have physical, you have virtual, you are moving to the cloud. You’ll continue to do so. Backup Exec covers it all. One Backup to Rule them All means reliable data protection that looks to the future without forgetting the present. It means cost savings on licensing, maintenance, hardware and training as you consolidate backup solutions. It means a faster, more secure and reliable recovery solution.
Flexible Storage Options
Backup Exec 16 supports a wide variety of storage options, allowing customers and partners important flexibility as they match the right storage device or device combination to the needs of a specific environment.
Disk Storage Devices
Most local and network disk devices can be utilized by Backup Exec for backup data storage. This includes local disk devices accessed via SATA or SAS adapters, shared storage devices accessed through Fiber Channel adapters or iSCSI initiator software, as well as network disk storage resources accessed through network protocols as UNC locations or CIFS shares. High-performance local storage can be promoted to a Deduplication Storage Device, allowing backup data stored to that device to be optimized using Backup Exec’s built-in deduplication technology.
Tape Storage Devices
In addition to disk storage, Backup Exec supports a wide variety of tape drives and tape libraries. Backup Exec also includes support for virtual tape libraries, allowing a disk resource to emulate a tape drive and be used in the same way.
Appliance Storage Options
Many 3rd-party appliances can also be used by Backup Exec as remote storage devices. Advanced functionality can be leveraged against 3rd-party appliances that have developed an OpenStorage (OST) plug-in, allowing Backup Exec to leverage the advanced data management capabilities that the OST API unlocks.
Cloud Storage Options
Backup Exec 16 also continues to expand it’s cloud capabilities. In addition to Backup Exec’s Private Cloud Services capability, Backup Exec 16 also supports the Quantum Q-cloud gateway solution, allowing customers flexible cloud options as an alternative or additional storage resources.
Overall, Backup Exec supports an amazing number of backup storage devices that very few competitors can even come close to matching. Symantec provides regularly updated documents that provide authoritative, current information about what specific software and hardware options are supported by Backup Exec. These are known as the Backup Exec hardware and software compatibility lists and are available to anyone via the Symantec knowledge base system.
Integrated Bare Metal Recovery
Leveraging the powerful Symantec Recovery Disk, also used in the Symantec System Recovery product, administrators can easily restore critical business servers from a bare metal state. Bare metal restore operations can be performed using backups stored to either disk or tape storage, including backups that have been stored in deduplicated format. When performing a bare metal restore operation from a backup set stored in a deduplication storage folder, the restore must be done using backup data stored on a remote Backup Exec 16 server. The Backup Exec 16 server performs rehydration tasks against the data to be restored, which is then transmitted to the remote server to be restored.
Bare metal restore capabilities come as a part of the Backup Exec 16 product; no additional license is necessary.
In order to enable bare metal recovery for a protected server, the backup job must be configured for full system protection. This feature is known as Simplified System Protection. Simplified System Protection ensures that the backup set contains all the critical operating system components needed to perform a bare metal recovery. By default, backup jobs in Backup Exec 16 are enabled for Simplified System Protection.
Fully Integrated Deduplication Technology
Backup Exec continues to refine and polish its integrated data deduplication technology, which is built-in directly to the Backup Exec server and the Agent for Windows and the Agent for Linux. This technology allows the Backup Exec server to host a deduplication storage device on a local disk, to which any or all backup streams can be saved. Backups saved to the deduplication storage device are scanned and optimized using variable-length segmenting, removing block redundancies from the backups and greatly reducing the amount of disk backup space consumed by deduplicated backups.
Backup Exec’s deduplication technology also includes advanced stream handlers for both VMware and Hyper-V backups, allowing for greater optimization of virtual machine backups.
The integrated deduplication technology within Backup Exec can be configured in several ways depending upon the environment in which deduplication is being used. This includes client deduplication, server deduplication, and appliance deduplication.
Highlight:
In the past: You were restricted to physical data center locations
Today: You are adopting 1 or more clouds
In the future: Imaging trying to control hundreds or thousands of business applications and data across these multiple clouds.
Focus: Reduce costs, Increase productivity and profitability, Speed to market, Meet Varied SLAs
Problem: Inflexibility in moving back from the cloud or moving between clouds
A move to a public cloud often occurs to drive down capital expenditures. If it is a public cloud where you will be running applications that you have to size for performance, there are some skillsets you will want to invest in before you make the move.
Monitoring
Security & Compliance
Orchestration & Automation
Security never sleeps.
Security is an integral part of any IT infrastructure. OUR job is to bring our leading technologies to every endpoint, every device, every enterprise.
Every stage requires capabilities and compliance.
Our mission is to protect and defend against any threat in any environment. We mean business.
First lets look at how attack methodology works. What are the phases, what are the important points of protection? Attackers are systematic, usually following…
Initial reconnaissance: seeing what’s out there
Incursion: What’s the actual incursion or break in point?
Discovery: Where they start looking at information – confidential, sensitive information.
Capture: The stage where they capture the information and assemble it.
Exfiltrate: Where information gets pushed out of the organisation, into the hands of the hackers or criminals.
The Backup Exec database stores sensitive information such as:
Logon Accounts for jobs,
Device access passwords, and
Data backup encryption keys.
Prior to BE 16, these columns were encrypted. Backup Exec 16 now provides a second layer of encryption using the AES 256 symmetric encryption algorithm.